Sony Reels From Multiple Hacker Attacks
In the past, many organizations - from Sony to NASA to the New York Times - have fallen victim to hacking incidents. In addition to costing organizations money, data breaches have also taken a significant toll on the trust customers have on affected businesses. It is therefore important to note that as entities continue to accumulate more PII of clients, the relevance of having in place adequate security measures cannot be overstated. This text reviews the 2011 Sony PSN hacking debacle. In so doing, it amongst other things discusses some of the measures that organizations ought to take to protect the private information of users. The text also speculates on why organizations are slow to report or acknowledge instances of data breach.
Sony Reels from Multiple Hacker Attacks
Overview
In the month of April, 2011, Sony experienced a massive external intrusion on its PlayStation Network. During the said intrusion, the account information of scores of the media conglomerate's PSN customers was accessed by the hackers. The damages Sony Suffered as a consequence of this particular outage are immense; this is particularly the case should one take into consideration the resulting compensation to users, the outcome of the various legal suits brought against the company, the costs associated with the release of security patches and other fixes, fines, loss of revenues during the outage period, loss of goodwill, etc.
To begin with, as part of the company's "Welcome Back" program, the existing members of PS (plus) service were granted a 30 additional days on their subscription (Yin-Poole, 2011). The program according to Yin-Poole was "designed to reward customers affected by the outage." Some of the security measures the company implemented, and for which it also had to incur some costs, include but they are not limited to, establishment of additional firewalls, enhancement of data encryption and protection, etc. In the UK, Sony according to Halliday (2013) was fined a total of 250,000 pounds for its failure to take appropriate measures to protect the information of users that had been compromised as a result of the hack. This according to Halliday (2013) is the largest fine ICO has imposed in recent times.
The total cost of the hacking incident has been estimated by various analysts to run into many millions of dollars. It would be difficult to in this case come up with the exact cost of the debacle. While Sony itself claims a total loss of $105 million, analysis such as Michael Pachter as Dutton (2012) observes are convinced that the company lost tens of millions. As Dutton further points out, one research manager at the International Data Corporation - IDC puts the total cost of breach at $250 million.
Most gamers, as the president of DFC Intelligence observes, do not "really hold a grudge against Sony" for this unfortunate intrusion incident (Dutton, 2012). As the author further points out, reputation wise, the company seems to have emerged from the debacle unscathed. This could be attributed to Sony's excellent handling of the entire incident. In that regard therefore, it would be safe to state that the incident cost Sony very few of its customers. As a matter of fact, Sony could have, in the final analysis, gained additional customers. According to the company, in addition to triggering the re-activation of approximately three million accounts that had been dormant, the breach led to activation of new accounts as more gamers joined the system (Dutton, 2012). As strange as this may sound, it is a claim collaborated by Jesse Divnich, the Vice President of EEDAR. In his opinion, the company's welcome back initiative could have exited customers -- both new and existing (Dutton, 2012). In other instances, such an incident could have led to a massive customer walkout.
One year after the hacking debacle, i.e. As of April, 2012, there were "no verifiable reports of any account holders having actual hard cash stolen or IDs hijacked" (Dutton, 2012). So far, i.e. As of December 2013, there has been no credit card fraud report that has been directly attributed to the data breach. Although no hack has in the recent past been successful or as massive as the one this text concerns itself with, Sony has had its PSN attacked at least one more time. For instance, in October 2011, intruders staged an unsuccessful attack on the company's PSN in an attempt to gain access to the various accounts of users (Hosaka, 2011).
2. Protecting the Private Information of Customers
Virtual services on the Internet routinely store PII and credit card information...
Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is Wikileaks. Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false
They would sometimes be using the school curriculum as an excuse to hack pertinent information that are government or privately owned. At some point, these students would be challenging themselves if they will be able to create and send unnecessary information (such as computer viruses) to other computer systems. This will provide extreme joy and satisfaction for these students. However, the issue here lies on how can this be
Hacktivism Securing the Electronic Frontier Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities. Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by
Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a
Hacker Hacking, Web Usage and the Internet Hierarchy Computer hacking is perceived as a crime and is frequently motivated by economic interests such as the stealing of personal and credit information, or by ideological interests such as the disruption of a company's service or the acquisition of classified information from government or corporate sites. However, hacking is also quite frequently used as an instrument for the expression of political, philosophical and practical frustrations.
Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now